1

If You Have Any Doubts, Don’t Click

There are plenty of ways scammers can get your information. Today we will talk about online-learning phishing and how hackers use Google Calendar for their purposes.

Dangerous knowledge

The approach to learning has changed drastically in the last decade. Now you can get the necessary skills without leaving your apartment. Courses, online marathons, and webinars. There are so many opportunities for self-improvement that it`s a sin not to take advantage of them. Nowadays bloggers are exploiting the topic of self-improvement. They consider their duty to create online products and earn on their sale. Topics range from “how to make your butt grow” to “how to earn your first million”. They offer a FREE webinar or files with “priceless” information. All you need to do is to enter your email and wait for the response. In terms of sales – it’s a great approach, but what about cybersecurity.

A lot of people want to drop their data and get something for free, which attracts hackers. It is unlikely that bloggers are very concerned about cybersecurity. So hackers use this opportunity to get an email database and then send phishing emails.

Plan carefully

The modern person is obsessed with planning. Google Calendar has become our best friend, and therefore a potential vulnerability. Phishers realized that they could use the calendar settings to place their events with phishing links or files in their victims’ schedules. In many cases, this also triggers automatically notifications. As they come from a trusted application, it builds people’s confidence in the fake events.

How do they do this? The attack comes directly from scammers who send a wave of calendar events to multiple Google Calendar users. The hackers take advantage of a default setting, according to which the victim calendar automatically adds any event and sends a notification about it. Hackers write a couple of lines about the event, and offer to follow the link, read the details, or download a description file. Then they wait for you to follow a malicious link or open attachment.

Remember, if you have any doubts, don’t click.

Related Posts

card__image

Ransomware Attack Shut US Gas Pipeline

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Февраль ещё не закончился, а уже стал тяжелым месяцем для нефтегазовой промышленности. Хакерам удалось провести сразу несколько несвязанных между собой атак с […]

card__image

Fasten Your Cyber Belts

There are 330 million connected cars in the world, and their number is growing rapidly. According to Upstream Security, from 2016 to 2019, the number of automotive cybersecurity incidents increased by 605%. Some figures: 57% of the attacks were by criminals for disruption, theft or ransom, 38% by researchers as a warning, to test systems security. […]

card__image

How Hackers Use Famous Companies

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Киберпреступники стали чаще выдавать себя за известные бренды и подделывать ссылки на их сайты для фишинга. Среди узнаваемых имен, которые используют в […]

Leave a Reply

Your email address will not be published. Required fields are marked *